Professional Documents
Culture Documents
Abstract
Telecommunication technologies in telemedicine services is the progress of wireless and portable networks has wide application of mobile electronic healthcare systems. Security is a fundamental system necessity because many patients have isolation concerns when their individual information is shared over the open wireless channels. This project determines the characteristics and security problem with wireless and persistent information interactions for a mobile healthcare system. Mobile health care system consists of a number of mobile devices and sensors attached to a patient. These devices form a mobile adhoc sensor network and assemble data that are sent to a hospital or healthcare center for monitoring. In this system a protected multicast strategy is engaged to evaluate the activities of each node, so that only truthful nodes are permitted to involve in interactions. A new trust evaluation model can efficiently estimate the trustworthiness of movable healthcare devices and effectively handle medical nodes.
CONTENTS S.NO 1.0 2.0 Introduction System Analysis 2.1 Existing System 2.2 Proposed System 3.0 Feasibility Study 3.1 Economical Feasibility 3.2 Technical Feasibility 3.3 Operational Feasibility 4.0 System Requirements Specification 4.1 Modules 4.2 Design Methodologies 4.3 Software Requirements 4.4 Hardware Requirements 4.5 Functional Requirements 4.6 Non-Functional Requirements 5.0 System Design 5.1 Data Flow Diagrams 5.2 E-R Diagram 5.3 UML Diagrams 5.4 Data Dictionary 6.0 7.0 8.0 9.0 10.0 11.0 12.0 13.0 Technology Description Coding System Testing Output Screens Implementation Future Enhancements Conclusion Bibliography 44 51 57 60 77 79 81 83 21 10 7 TITLE NAME PAGE.NO 1 5
1.0 INTRODUCTION
1.0 Introduction
There is much work on how to apply information and communication technologies to healthcare services, especially with regard to wireless networks and pervasive devices combined to provide more applications in electronic medical care. Thus, wireless and mobile communications lead to the emergence of a new type of advanced service for healthcare, making mobile healthcare systems more realistic and feasible in terms of providing expertbased medical care. Mobile computing provides new opportunities to personal users of healthcare services, both technical and non technical. Many successful case studies are found in areas such as emergency telemedicine, home monitoring, and transmission of medical records, remote surgery and virtual hospitals. With the development of mobile computing, one typical application is mobile ad hoc networks (MANETs), which allow their users to move randomly without any pre-deployed infrastructure or middleware. Obviously, these typical applications of wireless and mobile networks revolutionize todays healthcare systems. Mobile healthcare (m-healthcare) is an important research direction for the application of wireless communications in healthcare systems. Therefore, many wireless technologies, including IEEE 802.11, Bluetooth, and Wi-Fi, are used to form wireless local area networks (WLAN) and connect to the Internet. Mobile networks not only provide mobility to patients, but also allow physicians so they can access patients data anytime and anywhere. This brings important benefits to both patient and medical service provider. During the process of constructing an mobile-healthcare system, working for physicians by sending or receiving instant messages, either to hospitals to query about the patients information, or to the patient to remind him or her about necessary medication or examinations. In a word, m-healthcare environments can collect, transfer, and exchange medical information in a distributed method. This diminishes the administrative and medical costs for both hospital and patient, monitors the physical state of the patient, such as blood pressure, electroencephalogram (EEG), electrocardiogram (ECG), and reduces the risks of the patient under unexpected ailments. However, security is an essential requirement of the mobile healthcare system, since many patients have privacy concerns when it comes to releasing their personal information 5
over the open wireless channels. Though real-time monitoring and data transmission provides necessary information quickly, it can also expose a patients medical data to malicious intruders or eavesdroppers. If an m-healthcare system lacks the necessary protection when communicating data, unauthorized parties or persons can easily access the private data of a patient; medical records may be modified freely by malicious attackers, and false information can be injected into the data stream by a prohibited node. Therefore, when planning mobile healthcare, security is indispensable because of the shared nature of wireless devices, the mobility of the patients, and the vulnerabilities of pervasive and ubiquitous environments.
Discussion: The risk analysis showed that most of the proposed risk treatment measures must be implemented to obtain an acceptable risk level; among others blockingmuch of the additional functionality of the smartphone. To conclude on the usefulness of this IM service, it will be evaluated in a trial study of the humancomputer interaction. Further work also includes an improved design of the proposed MedIMob architecture. The applications of pervasive healthcare services have high requirements for wireless and mobile networks, such as secure information exchange, reliable remote control, confidential data storage, effective mobility management, rapid emergency response, and continuous monitoring of a patients medical conditions. Hameed describes the importance of mobile computing and the benefits of using wireless technologies in healthcare, since wireless and mobile hand-held or wearable devices help patients obtain central healthcare services quickly. Varshney discusses the applications and requirements of telemedicine systems, which include pervasive patient monitoring, remote data access, and intelligent emergency management. The author then presents a comprehensive wireless health monitoring concept that provides contextaware and reliable ubiquitous mobile telemedicine. Earlier developed a network-based computing application under some existing international healthcare informatics standards, and use the tele-cardiogram issue as a case study in distributed cardiac care. Earlier proposed a healthcare system based on a multiagent system (MAS) that would provide a series of services, such as mobile telemedicine, continuous monitoring, emergency processing, etc. These functions are achieved by various agents in combination with both medical sensors and wireless communication technologies. Additionally, their proposed healthcare system makes decisions about a patients present health by employing real-time data sensing as well as the patients medical history. System designs a mobile outpatient service system (MOSS) to achieve illness treatment, illness prevention and patient relation management. By using wireless and mobile devices, MOSS improves the management efficiency of a hospital and shortens the response time to emergency cases. Thus, wireless technologies can help telemedicine systems make mighty advances
10
3.1 ECONOMICAL FEASIBILITY This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased. 3.2 TECHNICAL FEASIBILITY This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system.
11
benefits?
12
13
4.1 Modules
The project entitled as A Secure Mobile Health Care System developed using .NET using C#. Modules display as follows Modules 1. User Verification 2. Online Appointment 3. Trust Evaluation 4. Data Transmission 5. Mobile Healthcare System
Module Description
1. User Verification User verification is needed for every system to keep security and for any other misuses. Each authorized user will have a user-id /name and a password for login. This is directly giving from the system admin or manager to the users who are authorized. The users want to follow some rules and conditions while using the system, and any misbehave will lead to block of particular user-id/name. 2. Online Appointment Unlike traditional hospital management schemes, where most patients only can access medical care or monitoring in a particular place at a specific time, current healthcare equipment can provide continuous monitoring of patients, as well as maximal mobility for them. Here, data communications rely on wireless channels instead of wires. However, mobility takes difficulty for data exchange as well because the requirements of the deployment of a number of infrastructures are able to increase the cost of mobile healthcare systems. We are going to simulate with maximum of five systems and it will be in wired technology. 3. Trust Evaluation Trust is defined as the degree to which a node should be trustworthy, secure, or reliable during any interaction with the node. The concept of trust has been introduced into mobile healthcare security with wide application in the realm of network and information security. Thereby, trust represents a mutual relationship established between any two 14
trustworthy medical nodes (sensors) for a specific purpose: one node, called the Object, can forward packets for another node, called the Subject. Here we are going to apply algorithm to find trust based nodes. 4. Data Transmission Unlike traditional hospital management schemes, where most patients only can access medical care or monitoring in a particular place at a specific time, current healthcare equipment can provide continuous monitoring of patients, as well as maximal mobility for them. Here, data communications rely on wireless channels instead of wires. However, mobility takes difficulty for data exchange as well because the requirements of the deployment of a number of infrastructures are able to increase the cost of mobile healthcare systems. We are going to simulate with maximum of two systems and it will be in wired technology. 5. Mobile healthcare system Mobile healthcare (m-healthcare) is an important research direction for the application of wireless communications in healthcare systems. Therefore, many wireless technologies, including IEEE 802.11, Bluetooth, and Wi-Fi, are used to form wireless local area networks (WLAN) and connect to the Internet. Mobile networks not only provide mobility to patients, but also allow physicians so they can access patients data anytime and anywhere. Combination of given three modules makes a mobile health care system.
15
Requirement Analysis and Design Analysis gathers the requirements for the system. This stage includes a detailed study of the business needs of the organization. Options for changing the business process may be considered. Design focuses on high level design like, what programs are needed and how are they going to interact, low-level design (how the individual programs are going to work), interface design (what are the interfaces going to look like) and data design (what data 16
will be required). During these phases, the software's overall structure is defined. Analysis and Design are very crucial in the whole development cycle. Any glitch in the design phase could be very expensive to solve in the later stage of the software development. Much care is taken during this phase. The logical system of the product is developed in this phase.
Implementation In this phase the designs are translated into code. Computer programs are written using a conventional programming language or an application generator. Programming tools like Compilers, Interpreters, and Debuggers are used to generate the code. Different high level programming languages like C, C++, Pascal, Java, .Net are used for coding. With respect to the type of application, the right programming language is chosen. Testing In this phase the system is tested. Normally programs are written as a series of individual modules, this subject to separate and detailed test. The system is then tested as a whole. The separate modules are brought together and tested as a complete system. The system is tested to ensure that interfaces between modules work (integration testing), the system works on the intended platform and with the expected volume of data (volume testing) and that the system does what the user requires (acceptance/beta testing). Maintenance Inevitably the system will need maintenance. Software will definitely undergo change once it is delivered to the customer. There are many reasons for the change. Change could happen because of some unexpected input values into the system. In addition, the changes in the system could directly affect the software operations. The software should be developed to accommodate changes that could happen during the post implementation period.
17
18
Outputs from computer systems are required primarily to communicate the results of processing to users. They are also used to provides a permanent copy of the results for later consultation. The various types of outputs in general are: External Outputs, whose destination is outside the organization. Internal Outputs whose destination is within organization and they are the users main interface with the computer. Operational outputs whose use is purely within the computer department. Interface outputs, which involve the user in communicating directly with
Output Definition
The outputs should be defined in terms of the following points: Type of the output Content of the output Format of the output Location of the output Frequency of the output Volume of the output Sequence of the output
It is not always desirable to print or display data as it is held on a computer. It should be decided as which form of the output is the most suitable. For Example Will decimal points need to be inserted? Should leading zeros be suppressed.
Output Media
In the next stage it is to be decided that which medium is the most appropriate for the output. The main considerations when deciding about the output media are: The suitability for the device to the particular application. The need for a hard copy. 19
The response time required. The location of the users. The software and hardware available. The cost.
Keeping in view the above description the project is to have outputs mainly coming under the category of internal outputs. The main outputs desired according to the requirement specification are: The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the screen. Keeping in view these outputs, the format for the output is taken from the outputs, which are currently being obtained after manual processing. The standard printer is to be used as output media for hard copies.
Input Design
Input design is a part of overall system design. The main objectives during the input design are as given below: To produce a cost-effective method of input. To achieve the highest possible level of accuracy. To ensure that the input is acceptable and understood by the user.
Input Stages
The main input stages can be listed as below: Data recording Data transcription Data conversion Data verification Data control Data transmission Data validation Data correction
Input Types
It is necessary to determine the various types of inputs. Inputs can be categorized as follows: 20
External inputs, which are prime inputs for the system. Internal inputs, which are user communications with the system. Operational, which are computer departments communications to the system? Interactive, which are inputs entered during a dialogue.
Input Media
At this stage choice has to be made about the input media. To conclude about the input media consideration has to be given to; Type of input Flexibility of format Speed Accuracy Verification methods Rejection rates Ease of correction Storage and handling requirements Security Easy to use Portability
Keeping in view the above description of the input types and input media, it can be said that most of the inputs are of the form of internal and interactive. As Input data is to be the directly keyed in by the user, the keyboard can be considered to be the most suitable input device.
Error Avoidance
At this stage care is to be taken to ensure that input data remains accurate form the stage at which it is recorded upto the stage in which the data is accepted by the system. This can be achieved only by means of careful control each time the data is handled.
Error Detection
21
Even though every effort is make to around the occurrence of errors, still a small proportion of errors is always likely to occur, these types of errors can be discovered by using validations to check the input data.
Data Validation
Procedures are designed to detect errors in data at a lower level of detail. Data validations have been included in the system in almost every area where there is a possibility for the user to commit errors. The system will not accept invalid data. Whenever an invalid data is keyed in, the system immediately prompts the user and the user has to again key in the data and the system will accept the data only if the data is correct. Validations have been included where necessary. The system is designed to be a user friendly one. In other words the system has been designed to communicate effectively with the user. The system has been designed with popup menus.
2. Forms oriented interface: The user calls up an image of the form to his/her screen and fills in the form. The forms oriented interface is chosen because it is the best choice.
change the system once it has been designed and on the other hand designing a system, which does not cater to the requirements of the user, is of no use. The requirement specification for any system can be broadly stated as given below: o The system should be able to interface with the existing system o The system should be accurate o The system should be better than the existing system The existing system is completely dependent on the user to perform all the duties.
24
MOBIL DEVICES
SHARED RESOURCES
TRUST CALCULATION
DATA TRANSMISSION
25 STOP
26
27
28
SPECIALIZATION
Sp ecDO CTO R
DOCSPECIALIZATIO
C
DOCTOR DISEASE S
Speciali st
HOSPITAL
HospitalId HospitalName Location WorkingHrsFrom WorkingHrsTo TotalNoDoctors Remarks
DOCTOR HospitalId DoctorId DoctorName DOJ WorkingHrsFro mWorkingHrsT o OnDuty y/n Remarks
DOCT OR -APPOI NT
APPOINTMENTS
Appointmentid HospitalId DoctorId PatientId DateofAppoint From To Status CompletedOrNot Remarks
DOC-SCHEDULE
PATIEN TDOCTO R
PatDise ase
D P
TESTREPORT
29
User Verification:
User Name
User
Password
Registration Form
New User
30
Trust Calculation:
A d m in / S e n d e r
E n c ry p t e d D e t a ils
P a t ie n t
D e c ry p t e d D e t a ils
Data Transmission:
A dm in
P a tien t
D o c to r
31
Class Diagram:
Mobile HealthCare Sytem +hospital nam e +hid +Mobility to patients() +Access to Doctors()
Administrator -id +m anage specializatons() +Update Doctors() Doctor +nam e -id +spciality +login() +get pat details() +m anage requests() #send reports()
32
c n et onc
t u t v rfi ai n r s ei c to
api t et p onmns
tr n fe r s l s a s r e ut
33
34
LOGIN
? EXIST S
insert
LOGOUT
Doctor Management:
35
LOGIN
? EXIST S
insert
LOGOUT
36
LOGIN
?
VERIFY
ALLOCATE
?
MANAGE
EDIT
ACCEPT APPOINTMENTS
EDIT APPOINTMENTS
REJECT APPOINTMENTS
LOGOUT
37
REGISTER
LOGIN
?
VERIFY valid
INVALID
SEARCH DOCTORS
REQUEST APPOINTMENTS
FEEDBACKS
LOGOUT
38
Doctors Schedule
39
REGISTER
LOGIN
?verify
VALI D
VIEW FEEDBACKS
? SEND
MOBILE
LOGOUT
40
Sequence diagram:
m obile devic es s haring hos pital
41
Collaboration Diagram:
2 : t ru s t
3 : a n a ly z e in fo 7 : re s u lt 5 : t ru s t 8 : in fo rm a t io n
h o s p it a l
42
Component Diagram:
REGISTRATION
LOGIN
DOCTOR
PATIENT
APPOINTMENTS
TRUST CALCULATIONS
TEST REPORTERS
43
Deployment Diagram:
Client Browser
IIS server
web server
windows application
sql server
mobile server
44
1. Table Name: Appointments:It is used for storing all the appointments given to the patients
45
4. Table name: Doctors - It contains the details of all the doctors registered over the website.
46
6. Table name: Patient : It contains the details of all the patients registered over the website.
47
7. Table name: Test reports It contains all the test reports managed for the patients
8. Table name : Test Calculations : It contains all the details like how the test reports are sent to the patients .
48
49
The following features of the .NET framework are also worth description:
Managed Code
The code that targets .NET, and which contains certain extra Information - metadata to describe itself. Whilst both managed and unmanaged code can run in the runtime, only managed code contains the information that allows the CLR to guarantee, for instance, safe execution and interoperability.
Managed Data
With Managed Code comes Managed Data. CLR provides memory allocation and Deal location facilities, and garbage collection. Some .NET languages use Managed Data by default, such as C#, Visual Basic.NET and JScript.NET, whereas others, namely C++, do not. Targeting CLR can, depending on the language youre using, impose certain constraints on the features available. As with managed and unmanaged code, one can have both managed and unmanaged data in .NET applications - data that doesnt get garbage collected but instead is looked after by unmanaged code.
the language. It has no standard library of its own, and instead has been designed with the intention of using the .NET libraries as its own.
Microsoft Visual J# .NET provides the easiest transition for Java-language developers into the world of XML Web Services and dramatically improves the interoperability of Javalanguage programs with existing software written in a variety of other programming languages. Active State has created Visual Perl and Visual Python, which enable .NET-aware applications to be built in either Perl or Python. Both products can be integrated into the Visual Studio .NET environment. Visual Perl includes support for Active States Perl Dev Kit. Other languages for which .NET compilers are available include FORTRAN COBOL Eiffel
XML WEB SERVICES Base Class Libraries Common Language Runtime Operating System C#.NET is also compliant with CLS (Common Language Specification) and supports structured exception handling. CLS is set of rules and constructs that are supported by the CLR (Common Language Runtime). CLR is the runtime environment provided by the .NET Framework; it manages the execution of the code and also makes the development process easier by providing services.
53
C#.NET is a CLS-compliant language. Any objects, classes, or components that created in C#.NET can be used in any other CLS-compliant language. In addition, we can use objects, classes, and components created in other CLS-compliant languages in C#.NET .The use of CLS ensures complete interoperability among applications, regardless of the languages used to create the application.
Garbage Collection
Garbage Collection is another new feature in C#.NET. The .NET Framework monitors allocated resources, such as objects and variables. In addition, the .NET Framework automatically releases memory for reuse by destroying objects that are no longer in use. In C#.NET, the garbage collector checks for the objects that are not currently in use by applications. When the garbage collector comes across an object that is marked for garbage collection, it releases the memory occupied by the object.
Overloading
Overloading is another feature in C#. Overloading enables us to define multiple procedures with the same name, where each procedure has a different set of arguments. Besides using overloading for procedures, we can use it for constructors and properties in a class.
54
Multithreading
C#.NET also supports multithreading. An application that supports multithreading can handle multiple tasks simultaneously, we can use multithreading to decrease the time taken by an application to respond to user interaction.
55
7.0 CODING
56
} protected void btn_reg_Click(object sender, EventArgs e) { long pid; cn.Open(); cmd = new SqlCommand("Select max(pid)from patdetail", cn); dr = cmd.ExecuteReader(); if (dr.Read()) { pid = Convert.ToInt64(dr[0]); pid += 1; } else { pid = 3001; } cn.Close(); cmd = null; string add = txt_add1.Text + txt_add2.Text; cn.Open(); cmd = new SqlCommand("insert into patdetail values(" + pid + ",'" + txt_fname.Text + "','" + txt_lname.Text + "','" + txt_email.Text + "','" + txt_pwd.Text + "','" + txt_phn.Text + "','" + add + "','" + txt_pin.Text + "','" + txt_state.Text + "','" + txt_dob.Text + "','" + rbl_sex.SelectedItem.Value + "','" + txt_qry.Text + "')", cn); cmd.ExecuteNonQuery(); cn.Close(); MessageBox.Show("You will get a confirmation through email and Login with your uname and password"); Response.Redirect("home.aspx"); } }
58
Login Page
using System; using System.Collections; using System.Configuration; using System.Data; using System.Linq; using System.Web; using System.Web.Security; using System.Web.UI; using System.Web.UI.HtmlControls; using System.Web.UI.WebControls; using System.Web.UI.WebControls.WebParts; using System.Xml.Linq; using System.Data.SqlClient; //using System.Data.SqlClient; using System.Windows.Forms; public partial class AddPat : System.Web.UI.Page {
SqlConnection cn = new SqlConnection("Server=SPIRO16\\SQLEXPRESS;Initial Catalog=HEALTH;uid=sa;pwd=sudarshan"); SqlCommand cmd; protected void Page_Load(object sender, EventArgs e) { if ( Session["uname"] == "Patient") { MessageBox.Show("You already signed in"); Response.Redirect("Home.aspx"); 59
} } protected void btn_login_Click(object sender, EventArgs e) { string var = Request.Params["var"]; if (var == null) { cn.Open(); cmd = new SqlCommand("select pid,fname from patdetail where email='" + txt_uname.Text + "' and pwd= '" + txt_pwd.Text + "' ", cn); SqlDataReader dr = cmd.ExecuteReader(); if (dr.Read()) { string s = dr["fname"].ToString(); Session["n"] = s; long a = Convert. ToInt64(dr[0]); MessageBox.Show("Login Success"); Session["uname"] = "Patient"; Session["user"] = a; Response.Redirect("PatStatus.aspx");
} else
60
} if ((txt_uname.Text == "admin") && (txt_pwd.Text == "admin")) { Session["uname"] = "admin"; Response.Redirect("Admin.aspx"); } else { Response.Write("<script>alert('Your not an authorised person')</script>"); } } }
61
62
error-free system into real-life environment and make necessary changes, which runs in an online fashion. Here system maintenance is done every months or year based on company policies, and is checked for errors like runtime errors, long run errors and other maintenances like table verification and reports.
64
65
OUTPUT SCREENS
Home Page
66
67
Patient Registration
68
Doctor Registration
69
Finding A Doctor
70
71
72
73
74
75
76
77
78
79
80
81
10.0 IMPLEMENTATION
82
IMPLEMENTATION
About Implementation
Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and its constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Implementation is the process of converting a new system design into operation. It is the phase that focuses on user training, site preparation and file conversion for installing a candidate system. The important factor that should be considered here is that the conversion should not disrupt the functioning of the organization.
83
84
Future Enhancements
A thorough observation and evaluation of the use of a messaging service will be conducted, focusing on computer-supported cooperative work and the humancomputer interaction. A preliminary experiment will be performed by use of existing technology: a two-way pager system with the possibility to predefine standard messages. This is additional functionality that can easily be included in the pager and alarm system in use in the hospital department today. The purpose of this observation and evaluation is to obtain an understanding of the communication pattern and identify adequate message types and the need for presence information. The results from this study would then be to incorporate the findings into an improved design and development of our system. An improved design of the system should also focus on offering a secure use of the built-in functionalities of the smart phone (e.g. web access, Bluetooth, and MMS). The possibility for automatically storing (parts of) the messages into the patients health record should also be investigated.
Advantages
Confidentiality achieved using symmetric cryptography algorithm, so unauthorized parties cannot access this information. Authentication is achieved. Only particular patients and medical specialist can access their medical information
85
12.0 CONCLUSION
86
Conclusion
The introduction of mobile healthcare systems can greatly improve the benefits for patients and hospitals, by not only providing better quality of patient care, but by also raised interesting research issues in wireless and pervasive healthcare reducing administrative and medical costs for both patients and hospitals. The topic of security has networks. Here, we introduce the technique of trust evaluation without a centralized trust management authority and propose a novel trust evaluation model that can efficiently calculate the trustworthiness of mobile healthcare devices and dynamically manage medical nodes. Furthermore, we present a secure multicast mechanism based on our trust evaluation model, which offers flexible protection to dynamic and agile environments and improves the security of a pervasive and mobile healthcare system. The analysis of our experimental results clearly demonstrates that, compared to traditional schemes, such as the linear trust computation model or the group-based management system, our trust model can genuinely improve the security and reliability of the network while also reducing the complexity of the traditional trust schemes and thus improving efficiency. Therefore, our trust-based multicast strategy provides an excellent solution for guaranteeing secure and reliable communications in wireless and pervasive healthcare networks.
87
13.0 BIBILOGRAPHY
88
BIBILOGRAPHY
[1] E. Bones, P. Hasvold , E. Henriksen , and T. Strandenes , Risk analysis of information security in a mobile instant messaging and presence system for healthcare, International J. Medical Informatics, Vol. 76, pp. 677687, 2007. [2] A. Boukerche , Performance Evaluation of Routing Protocols for AdHoc Wireless Networks, ACM/Springer Mobile Networks and Applications ,Vol. 9, pp. 333342, 2004. [3] A. Boukerche , Handbook of Algorithms for Wireless Networking and Mobile Computing, New York: CRC/Chapman Hall, 2005. [4] A. Boukerche , K. El-Khatib , L. Xu , and L. Korba , Performance evaluation of an anonymity providing protocol for wireless ad hoc networks, Performance Evaluation, Vol. 63, pp. 10941109, 2006.
89